WO2001006386A1 - Systeme et procede de changement dynamique d'un port ou d'une adresse d'ordinateur - Google Patents
Systeme et procede de changement dynamique d'un port ou d'une adresse d'ordinateur Download PDFInfo
- Publication number
- WO2001006386A1 WO2001006386A1 PCT/US2000/019224 US0019224W WO0106386A1 WO 2001006386 A1 WO2001006386 A1 WO 2001006386A1 US 0019224 W US0019224 W US 0019224W WO 0106386 A1 WO0106386 A1 WO 0106386A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- port
- handoff
- messages
- sender
- address
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 230
- 230000008569 process Effects 0.000 claims abstract description 198
- 238000010926 purge Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims 2
- 230000009471 action Effects 0.000 description 47
- 238000012545 processing Methods 0.000 description 45
- 238000004891 communication Methods 0.000 description 35
- 230000006870 function Effects 0.000 description 27
- 230000008859 change Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 238000011156 evaluation Methods 0.000 description 6
- 238000013459 approach Methods 0.000 description 5
- 230000004044 response Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000003213 activating effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000005096 rolling process Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000011144 upstream manufacturing Methods 0.000 description 2
- VBMOHECZZWVLFJ-GXTUVTBFSA-N (2s)-2-[[(2s)-6-amino-2-[[(2s)-6-amino-2-[[(2s,3r)-2-[[(2s,3r)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-2-[[(2s)-2,6-diaminohexanoyl]amino]-5-(diaminomethylideneamino)pentanoyl]amino]propanoyl]amino]hexanoyl]amino]propanoyl]amino]hexan Chemical compound NC(N)=NCCC[C@@H](C(O)=O)NC(=O)[C@H](CCCCN)NC(=O)[C@H](CCCCN)NC(=O)[C@H]([C@@H](C)O)NC(=O)[C@H]([C@H](O)C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCN=C(N)N)NC(=O)[C@@H](N)CCCCN VBMOHECZZWVLFJ-GXTUVTBFSA-N 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000013467 fragmentation Methods 0.000 description 1
- 238000006062 fragmentation reaction Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 108010068904 lysyl-arginyl-alanyl-lysyl-alanyl-lysyl-threonyl-threonyl-lysyl-lysyl-arginine Proteins 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000000246 remedial effect Effects 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
- 239000004557 technical material Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU60988/00A AU6098800A (en) | 1999-07-14 | 2000-07-14 | System and method for dynamically changing a computer port or address |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14382199P | 1999-07-14 | 1999-07-14 | |
US60/143,821 | 1999-07-14 | ||
US15153199P | 1999-08-30 | 1999-08-30 | |
US60/151,531 | 1999-08-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001006386A1 true WO2001006386A1 (fr) | 2001-01-25 |
Family
ID=26841423
Family Applications (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/019222 WO2001006373A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede permettant de generer un contenu fictif pour un ordinateur |
PCT/US2000/019224 WO2001006386A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede de changement dynamique d'un port ou d'une adresse d'ordinateur |
PCT/US2000/019278 WO2001005168A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede de prevention de detection d'une connexion d'un ordinateur a un dispositif externe |
PCT/US2000/019487 WO2001004753A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede servant a rechercher l'origine d'une attaque informatique |
PCT/US2000/019489 WO2001004759A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede destines a la securite informatique |
PCT/US2000/019488 WO2001004758A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede d'authentification rapide de messages a l'aide de numeros de sequence |
PCT/US2000/019389 WO2001004757A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede destines a empecher la detection d'un processus choisi en cours d'execution sur un ordinateur |
PCT/US2000/019359 WO2001004733A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede de protection d'un reseau informatique contre les tentatives de violation provoquant un deni de service |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/019222 WO2001006373A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede permettant de generer un contenu fictif pour un ordinateur |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/019278 WO2001005168A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede de prevention de detection d'une connexion d'un ordinateur a un dispositif externe |
PCT/US2000/019487 WO2001004753A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede servant a rechercher l'origine d'une attaque informatique |
PCT/US2000/019489 WO2001004759A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede destines a la securite informatique |
PCT/US2000/019488 WO2001004758A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede d'authentification rapide de messages a l'aide de numeros de sequence |
PCT/US2000/019389 WO2001004757A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede destines a empecher la detection d'un processus choisi en cours d'execution sur un ordinateur |
PCT/US2000/019359 WO2001004733A1 (fr) | 1999-07-14 | 2000-07-14 | Systeme et procede de protection d'un reseau informatique contre les tentatives de violation provoquant un deni de service |
Country Status (4)
Country | Link |
---|---|
US (2) | US7461402B1 (fr) |
EP (3) | EP1203280B1 (fr) |
AU (8) | AU6107600A (fr) |
WO (8) | WO2001006373A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7337470B2 (en) | 2002-08-23 | 2008-02-26 | International Business Machines Corporation | Method for minimizing denial of service attacks on network servers |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU5122499A (en) | 1998-07-27 | 2000-02-21 | Genentech Inc. | Improved transformation efficiency in phage display through modification of a coat protein |
US7117532B1 (en) * | 1999-07-14 | 2006-10-03 | Symantec Corporation | System and method for generating fictitious content for a computer |
US7461402B1 (en) | 1999-07-14 | 2008-12-02 | Symantec Corporation | System and method for preventing detection of a selected process running on a computer |
US6981155B1 (en) | 1999-07-14 | 2005-12-27 | Symantec Corporation | System and method for computer security |
US7203962B1 (en) | 1999-08-30 | 2007-04-10 | Symantec Corporation | System and method for using timestamps to detect attacks |
US6907533B2 (en) | 2000-07-14 | 2005-06-14 | Symantec Corporation | System and method for computer security using multiple cages |
WO2002089426A1 (fr) * | 2001-04-27 | 2002-11-07 | Ntt Data Corporation | Systeme d'analyse de paquets |
US7146642B1 (en) | 2001-06-29 | 2006-12-05 | Mcafee, Inc. | System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device |
CA2454828A1 (fr) * | 2001-07-24 | 2003-02-06 | Theresa Eileen Phillips | Architecture de securite de reseau |
US7657935B2 (en) | 2001-08-16 | 2010-02-02 | The Trustees Of Columbia University In The City Of New York | System and methods for detecting malicious email transmission |
US9306966B2 (en) | 2001-12-14 | 2016-04-05 | The Trustees Of Columbia University In The City Of New York | Methods of unsupervised anomaly detection using a geometric framework |
US7225343B1 (en) | 2002-01-25 | 2007-05-29 | The Trustees Of Columbia University In The City Of New York | System and methods for adaptive model generation for detecting intrusions in computer systems |
TWI235580B (en) * | 2002-05-03 | 2005-07-01 | Ke-Cheng Fang | Network security system and method for recording and resisting hacker |
US7269850B2 (en) * | 2002-12-31 | 2007-09-11 | Intel Corporation | Systems and methods for detecting and tracing denial of service attacks |
US7363513B2 (en) * | 2004-04-15 | 2008-04-22 | International Business Machines Corporation | Server denial of service shield |
FI20041681A0 (fi) * | 2004-12-29 | 2004-12-29 | Nokia Corp | Liikenteen rajoittaminen kommunikaatiojärjestelmissä |
US8196205B2 (en) * | 2006-01-23 | 2012-06-05 | University Of Washington Through Its Center For Commercialization | Detection of spyware threats within virtual machine |
US8479288B2 (en) * | 2006-07-21 | 2013-07-02 | Research In Motion Limited | Method and system for providing a honeypot mode for an electronic device |
WO2008055156A2 (fr) | 2006-10-30 | 2008-05-08 | The Trustees Of Columbia University In The City Of New York | Procedes, supports et systemes permettant de detecter une sequence anormale d'appels de fonction |
CN101335746A (zh) * | 2007-06-29 | 2008-12-31 | 国际商业机器公司 | 保护软件系统的完整性的安全设备和方法及其系统 |
US20090300423A1 (en) * | 2008-05-28 | 2009-12-03 | James Michael Ferris | Systems and methods for software test management in cloud-based network |
US8413241B2 (en) * | 2009-09-17 | 2013-04-02 | Oracle America, Inc. | Integrated intrusion deflection, detection and introspection |
WO2011119137A1 (fr) | 2010-03-22 | 2011-09-29 | Lrdc Systems, Llc | Procédé destiné à identifier et à protéger l'intégrité d'un ensemble de données de source |
US9129257B2 (en) * | 2010-12-20 | 2015-09-08 | Verizon Patent And Licensing Inc. | Method and system for monitoring high risk users |
WO2014046974A2 (fr) | 2012-09-20 | 2014-03-27 | Case Paul Sr | Architecture informatique sécurisée de boîtier |
US9049173B2 (en) | 2013-06-05 | 2015-06-02 | Fortinet, Inc. | Cloud based logging service |
US10432498B1 (en) | 2014-02-12 | 2019-10-01 | Google Llc | Location privacy aggregation testing |
US9591022B2 (en) | 2014-12-17 | 2017-03-07 | The Boeing Company | Computer defenses and counterattacks |
WO2017139372A1 (fr) * | 2016-02-08 | 2017-08-17 | Acxiom Corporation | Création d'une empreinte numérique de changement pour des tables de base de données, des fichiers de texte et des sources de données |
US20170324774A1 (en) * | 2016-05-05 | 2017-11-09 | Javelin Networks, Inc. | Adding supplemental data to a security-related query |
US10515187B2 (en) | 2016-06-29 | 2019-12-24 | Symantec Corporation | Artificial intelligence (AI) techniques for learning and modeling internal networks |
US10637864B2 (en) | 2016-05-05 | 2020-04-28 | Ca, Inc. | Creation of fictitious identities to obfuscate hacking of internal networks |
US10609075B2 (en) | 2016-05-22 | 2020-03-31 | Guardicore Ltd. | Masquerading and monitoring of shared resources in computer networks |
US20170366563A1 (en) * | 2016-06-21 | 2017-12-21 | Guardicore Ltd. | Agentless ransomware detection and recovery |
US10769275B2 (en) | 2017-10-06 | 2020-09-08 | Ca, Inc. | Systems and methods for monitoring bait to protect users from security threats |
US11050769B2 (en) * | 2018-02-05 | 2021-06-29 | Bank Of America Corporation | Controlling dynamic user interface functionality using a machine learning control engine |
US10601868B2 (en) * | 2018-08-09 | 2020-03-24 | Microsoft Technology Licensing, Llc | Enhanced techniques for generating and deploying dynamic false user accounts |
US11057428B1 (en) * | 2019-03-28 | 2021-07-06 | Rapid7, Inc. | Honeytoken tracker |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4922408A (en) * | 1985-09-27 | 1990-05-01 | Schlumberger Technology Corporation | Apparatus for multi-processor communications |
US5020052A (en) * | 1986-12-19 | 1991-05-28 | Alcatel N.V. | Packet switching network |
US5537099A (en) * | 1992-04-16 | 1996-07-16 | Bay Networks, Inc. | Receiving port security in a network concentrator |
US5581541A (en) * | 1992-06-17 | 1996-12-03 | Texas Instruments Incorporated | Hierarchical connection method apparatus and protocol |
US5642083A (en) * | 1994-11-28 | 1997-06-24 | Murata Manufacturing Co., Ltd. | High-frequency switch |
US5892924A (en) * | 1996-01-31 | 1999-04-06 | Ipsilon Networks, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
US5920705A (en) * | 1996-01-31 | 1999-07-06 | Nokia Ip, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
Family Cites Families (156)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4825406A (en) | 1981-10-05 | 1989-04-25 | Digital Equipment Corporation | Secondary storage facility employing serial communications between drive and controller |
US4719566A (en) * | 1985-10-23 | 1988-01-12 | International Business Machines Corporation | Method for entrapping unauthorized computer access |
US4897874A (en) * | 1988-03-31 | 1990-01-30 | American Telephone And Telegraph Company At&T Bell Laboratories | Metropolitan area network arrangement for serving virtual data networks |
US5107489A (en) | 1989-10-30 | 1992-04-21 | Brown Paul J | Switch and its protocol for making dynamic connections |
JP2810231B2 (ja) | 1990-01-30 | 1998-10-15 | ジヨンソン・サービス・カンパニー | ノードを有する分散形ネットワークシステム中のデータの位置付け方法 |
US5574912A (en) | 1990-05-04 | 1996-11-12 | Digital Equipment Corporation | Lattice scheduler method for reducing the impact of covert-channel countermeasures |
US5301333A (en) | 1990-06-14 | 1994-04-05 | Bell Communications Research, Inc. | Tree structured variable priority arbitration implementing a round-robin scheduling policy |
US5032979A (en) | 1990-06-22 | 1991-07-16 | International Business Machines Corporation | Distributed security auditing subsystem for an operating system |
EP0472861B1 (fr) | 1990-08-31 | 1995-09-20 | International Business Machines Corporation | Procédé et appareil de commande de partition croisée dans un environnement de traitement cloisonné |
EP0484603B1 (fr) * | 1990-11-09 | 1995-09-13 | International Business Machines Corporation | Non-répudiation dans des réseaux d'ordinateur |
JPH04310188A (ja) | 1991-03-01 | 1992-11-02 | Internatl Business Mach Corp <Ibm> | 文書/画像ライブラリのためのライブラリサービス方法 |
US5724569A (en) | 1991-03-29 | 1998-03-03 | Bull S.A. | Apparatus for evaluating database query performance having libraries containing information for modeling the various system components of multiple systems |
US5408642A (en) | 1991-05-24 | 1995-04-18 | Symantec Corporation | Method for recovery of a computer program infected by a computer virus |
US5694590A (en) | 1991-09-27 | 1997-12-02 | The Mitre Corporation | Apparatus and method for the detection of security violations in multilevel secure databases |
JPH0619771A (ja) * | 1992-04-20 | 1994-01-28 | Internatl Business Mach Corp <Ibm> | 異種のクライアントによる共用ファイルのファイル管理機構 |
US5278901A (en) * | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method |
US5485409A (en) | 1992-04-30 | 1996-01-16 | International Business Machines Corporation | Automated penetration analysis system and method |
US5361359A (en) * | 1992-08-31 | 1994-11-01 | Trusted Information Systems, Inc. | System and method for controlling the use of a computer |
US5471631A (en) | 1992-10-19 | 1995-11-28 | International Business Machines Corporation | Using time stamps to correlate data processing event times in connected data processing units |
US5390173A (en) | 1992-10-22 | 1995-02-14 | Digital Equipment Corporation | Packet format in hub for packet data communications system |
US5566339A (en) | 1992-10-23 | 1996-10-15 | Fox Network Systems, Inc. | System and method for monitoring computer environment and operation |
US5574898A (en) | 1993-01-08 | 1996-11-12 | Atria Software, Inc. | Dynamic software version auditor which monitors a process to provide a list of objects that are accessed |
US5757913A (en) | 1993-04-23 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for data authentication in a data communication environment |
FR2706652B1 (fr) | 1993-06-09 | 1995-08-18 | Alsthom Cge Alcatel | Dispositif de détection d'intrusions et d'usagers suspects pour ensemble informatique et système de sécurité comportant un tel dispositif. |
US5613113A (en) | 1993-10-08 | 1997-03-18 | International Business Machines Corporation | Consistent recreation of events from activity logs |
US5689700A (en) | 1993-12-29 | 1997-11-18 | Microsoft Corporation | Unification of directory service with file system services |
US5557742A (en) | 1994-03-07 | 1996-09-17 | Haystack Labs, Inc. | Method and system for detecting intrusion into and misuse of a data processing system |
US5572590A (en) | 1994-04-12 | 1996-11-05 | International Business Machines Corporation | Discrimination of malicious changes to digital information using multiple signatures |
CA2143874C (fr) * | 1994-04-25 | 2000-06-20 | Thomas Edward Cooper | Methode et appareil pour permettre l'essai de logiciels : methode et appareil d'utilisation de talons de dechiffrement |
EP0684716B1 (fr) * | 1994-05-25 | 2002-02-27 | International Business Machines Corporation | Réseau de communication de données et procédé d'opération de ce réseau |
DE69511556D1 (de) | 1994-06-01 | 1999-09-23 | Quantum Leap Innovations Inc | Computervirenfalle |
US5588060A (en) | 1994-06-10 | 1996-12-24 | Sun Microsystems, Inc. | Method and apparatus for a key-management scheme for internet protocols |
US5638509A (en) | 1994-06-10 | 1997-06-10 | Exabyte Corporation | Data storage and protection system |
US5533123A (en) | 1994-06-28 | 1996-07-02 | National Semiconductor Corporation | Programmable distributed personal security |
US5530757A (en) | 1994-06-28 | 1996-06-25 | International Business Machines Corporation | Distributed fingerprints for information integrity verification |
US5483649A (en) | 1994-07-01 | 1996-01-09 | Ybm Technologies, Inc. | Personal computer security system |
US5623601A (en) | 1994-11-18 | 1997-04-22 | Milkway Networks Corporation | Apparatus and method for providing a secure gateway for communication and data exchanges between networks |
US5937413A (en) | 1994-11-30 | 1999-08-10 | Electronics And Telecommunications Research Institure | Data audits based on timestamp criteria in replicated data bases within digital mobile telecommunication system |
US5555543A (en) | 1995-01-03 | 1996-09-10 | International Business Machines Corporation | Crossbar switch apparatus and protocol |
DE69638018D1 (de) | 1995-02-13 | 2009-10-15 | Intertrust Tech Corp | Systeme und Verfahren zur Verwaltung von gesicherten Transaktionen und zum Schutz von elektronischen Rechten |
US5655081A (en) | 1995-03-08 | 1997-08-05 | Bmc Software, Inc. | System for monitoring and managing computer resources and applications across a distributed computing environment using an intelligent autonomous agent architecture |
TW278292B (en) | 1995-03-17 | 1996-06-11 | Advanced Micro Devices Inc | Intrusion control for secure networks |
US5680585A (en) | 1995-03-31 | 1997-10-21 | Bay Networks, Inc. | Method and apparatus for defining data packet formats |
US5619645A (en) | 1995-04-07 | 1997-04-08 | Sun Microsystems, Inc. | System isolation and fast-fail |
EP0826181A4 (fr) | 1995-04-11 | 2005-02-09 | Kinetech Inc | Identification des donnees dans un systeme informatique |
EP0835507A4 (fr) * | 1995-06-05 | 1998-09-09 | Quantum Peripherals Colorado | Transducteur d'ecriture a flux accru et son procede de fabrication conjointement avec des ecrans partages sur tetes de lecture magnetoresistantes |
US5790808A (en) | 1995-07-06 | 1998-08-04 | 3 Com | Active topology maintenance in reconfiguring bridged local area networks with state transition with forgetting interval |
US5862477A (en) | 1995-08-31 | 1999-01-19 | Northern Telecom Limited | Topology verification process for controlling a personal communication services system |
US5826013A (en) | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module |
US6115802A (en) * | 1995-10-13 | 2000-09-05 | Sun Mircrosystems, Inc. | Efficient hash table for use in multi-threaded environments |
US5771291A (en) | 1995-12-11 | 1998-06-23 | Newton; Farrell | User identification and authentication system using ultra long identification keys and ultra large databases of identification keys for secure remote terminal access to a host computer |
US5809230A (en) | 1996-01-16 | 1998-09-15 | Mclellan Software International, Llc | System and method for controlling access to personal computer system resources |
US5870550A (en) | 1996-02-26 | 1999-02-09 | Network Engineering Software | Web server employing multi-homed, moldular framework |
JP3165366B2 (ja) * | 1996-02-08 | 2001-05-14 | 株式会社日立製作所 | ネットワークセキュリティシステム |
US5913024A (en) | 1996-02-09 | 1999-06-15 | Secure Computing Corporation | Secure server utilizing separate protocol stacks |
US5740173A (en) * | 1996-02-28 | 1998-04-14 | Telefonaktiebolaget Lm Ericsson | Asynchronous transfer mode (ATM) cell arrival monitoring system |
US5768526A (en) * | 1996-03-08 | 1998-06-16 | Glenayre Electronics, Inc. | Method and apparatus for validating data packets in a paging system |
US5825750A (en) * | 1996-03-29 | 1998-10-20 | Motorola | Method and apparatus for maintaining security in a packetized data communications network |
US6032266A (en) | 1996-04-05 | 2000-02-29 | Hitachi, Ltd. | Network system having function of changing route upon failure |
US6014645A (en) | 1996-04-19 | 2000-01-11 | Block Financial Corporation | Real-time financial card application system |
US5822434A (en) | 1996-06-19 | 1998-10-13 | Sun Microsystems, Inc. | Scheme to allow two computers on a network to upgrade from a non-secured to a secured session |
US6031978A (en) | 1996-06-28 | 2000-02-29 | International Business Machines Corporation | System, method and program for enabling a client to reconnect to a same server in a network of computer systems after the server has moved to a different network address |
US5778070A (en) | 1996-06-28 | 1998-07-07 | Intel Corporation | Method and apparatus for protecting flash memory |
US6041123A (en) | 1996-07-01 | 2000-03-21 | Allsoft Distributing Incorporated | Centralized secure communications system |
US6115799A (en) * | 1996-07-19 | 2000-09-05 | Canon Kabushiki Kaisha | Information processing apparatus and associated method for managing a memory using a next fit and for reducing a memory fragmentation problem |
US6067620A (en) | 1996-07-30 | 2000-05-23 | Holden; James M. | Stand alone security device for computer networks |
US5903830A (en) * | 1996-08-08 | 1999-05-11 | Joao; Raymond Anthony | Transaction security apparatus and method |
US6381632B1 (en) | 1996-09-10 | 2002-04-30 | Youpowered, Inc. | Method and apparatus for tracking network usage |
US5892903A (en) * | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
US5958050A (en) | 1996-09-24 | 1999-09-28 | Electric Communities | Trusted delegation system |
US5844986A (en) | 1996-09-30 | 1998-12-01 | Intel Corporation | Secure BIOS |
US6049546A (en) | 1996-10-15 | 2000-04-11 | At&T Corporation | System and method for performing switching in multipoint-to-multipoint multicasting |
US6253323B1 (en) | 1996-11-01 | 2001-06-26 | Intel Corporation | Object-based digital signatures |
US6453345B2 (en) | 1996-11-06 | 2002-09-17 | Datadirect Networks, Inc. | Network security and surveillance system |
US5991881A (en) * | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
US5796942A (en) | 1996-11-21 | 1998-08-18 | Computer Associates International, Inc. | Method and apparatus for automated network-wide surveillance and security breach intervention |
US6021491A (en) | 1996-11-27 | 2000-02-01 | Sun Microsystems, Inc. | Digital signatures for data streams and data archives |
US6665733B1 (en) | 1996-12-30 | 2003-12-16 | Hewlett-Packard Development Company, L.P. | Network communication device including bonded ports for increased bandwidth |
US6233686B1 (en) | 1997-01-17 | 2001-05-15 | At & T Corp. | System and method for providing peer level access control on a network |
US5953502A (en) * | 1997-02-13 | 1999-09-14 | Helbig, Sr.; Walter A | Method and apparatus for enhancing computer system security |
US5925126A (en) * | 1997-03-18 | 1999-07-20 | Memco Software, Ltd. | Method for security shield implementation in computer system's software |
US5960170A (en) | 1997-03-18 | 1999-09-28 | Trend Micro, Inc. | Event triggered iterative virus detection |
US6226745B1 (en) | 1997-03-21 | 2001-05-01 | Gio Wiederhold | Information sharing system and method with requester dependent sharing and security rules |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6009474A (en) | 1997-05-20 | 1999-12-28 | Compaq Computer Corporation | Method and apparatus for re-assigning network addresses to network servers by re-configuring a client host connected thereto |
US5870350A (en) * | 1997-05-21 | 1999-02-09 | International Business Machines Corporation | High performance, high bandwidth memory bus architecture utilizing SDRAMs |
US6247032B1 (en) | 1997-06-19 | 2001-06-12 | International Business Machines Corp. | Automated system and method for approving web site content |
US6122256A (en) | 1997-08-18 | 2000-09-19 | International Business Machines Corporation | Fail-safe communications network for use in system power control |
US5928363A (en) * | 1997-08-27 | 1999-07-27 | International Business Machines Corporation | Method and means for preventing unauthorized resumption of suspended authenticated internet sessions using locking and trapping measures |
US6009524A (en) | 1997-08-29 | 1999-12-28 | Compact Computer Corp | Method for the secure remote flashing of a BIOS memory |
US5961644A (en) | 1997-09-19 | 1999-10-05 | International Business Machines Corporation | Method and apparatus for testing the integrity of computer security alarm systems |
SE513936C2 (sv) | 1997-10-10 | 2000-11-27 | Ericsson Telefon Ab L M | Förfarande och system för att åstadkomma accessportadressering i ett generiskt radioaccessnät |
US6097817A (en) * | 1997-12-10 | 2000-08-01 | Omnipoint Corporation | Encryption and decryption in communication system with wireless trunk |
US6311274B1 (en) | 1997-12-15 | 2001-10-30 | Intel Corporation | Network alert handling system and method |
US6079020A (en) * | 1998-01-27 | 2000-06-20 | Vpnet Technologies, Inc. | Method and apparatus for managing a virtual private network |
US6070246A (en) | 1998-02-04 | 2000-05-30 | 3Com Corporation | Method and system for secure cable modem initialization |
US6442694B1 (en) | 1998-02-27 | 2002-08-27 | Massachusetts Institute Of Technology | Fault isolation for communication networks for isolating the source of faults comprising attacks, failures, and other network propagating errors |
US6055236A (en) | 1998-03-05 | 2000-04-25 | 3Com Corporation | Method and system for locating network services with distributed network address translation |
US6170063B1 (en) | 1998-03-07 | 2001-01-02 | Hewlett-Packard Company | Method for performing atomic, concurrent read and write operations on multiple storage devices |
US6141686A (en) | 1998-03-13 | 2000-10-31 | Deterministic Networks, Inc. | Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control |
US6453419B1 (en) | 1998-03-18 | 2002-09-17 | Secure Computing Corporation | System and method for implementing a security policy |
DE19812330C2 (de) * | 1998-03-20 | 2002-08-08 | Dornier Gmbh | Startvorrichtung für einen geschleppten Flugkörper |
USH1944H1 (en) | 1998-03-24 | 2001-02-06 | Lucent Technologies Inc. | Firewall security method and apparatus |
US6058431A (en) | 1998-04-23 | 2000-05-02 | Lucent Technologies Remote Access Business Unit | System and method for network address translation as an external service in the access server of a service provider |
US6408391B1 (en) | 1998-05-06 | 2002-06-18 | Prc Inc. | Dynamic system defense for information warfare |
US6628653B1 (en) | 1998-06-04 | 2003-09-30 | Nortel Networks Limited | Programmable packet switching device |
US6347374B1 (en) | 1998-06-05 | 2002-02-12 | Intrusion.Com, Inc. | Event detection |
US6278966B1 (en) | 1998-06-18 | 2001-08-21 | International Business Machines Corporation | Method and system for emulating web site traffic to identify web site usage patterns |
US6256393B1 (en) | 1998-06-23 | 2001-07-03 | General Instrument Corporation | Authorization and access control of software object residing in set-top terminals |
US6134664A (en) | 1998-07-06 | 2000-10-17 | Prc Inc. | Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources |
US6351752B1 (en) | 1998-07-08 | 2002-02-26 | Ncr Corporation | Method and apparatus for detecting changes to a collection of objects |
US6269447B1 (en) | 1998-07-21 | 2001-07-31 | Raytheon Company | Information security analysis system |
US6256664B1 (en) | 1998-09-01 | 2001-07-03 | Bigfix, Inc. | Method and apparatus for computed relevance messaging |
WO2000019324A1 (fr) * | 1998-09-28 | 2000-04-06 | Argus Systems Group, Inc. | Systeme d'exploitation d'ordinateur a partitionnement de securite |
US6577920B1 (en) | 1998-10-02 | 2003-06-10 | Data Fellows Oyj | Computer virus screening |
US6560611B1 (en) | 1998-10-13 | 2003-05-06 | Netarx, Inc. | Method, apparatus, and article of manufacture for a network monitoring system |
US6389458B2 (en) | 1998-10-30 | 2002-05-14 | Ideaflood, Inc. | Method, apparatus and system for directing access to content on a computer network |
US6367029B1 (en) | 1998-11-03 | 2002-04-02 | Sun Microsystems, Inc. | File server system tolerant to software and hardware failures |
US6381646B2 (en) | 1998-11-03 | 2002-04-30 | Cisco Technology, Inc. | Multiple network connections from a single PPP link with partial network address translation |
US6321338B1 (en) | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6260016B1 (en) | 1998-11-25 | 2001-07-10 | Matsushita Electric Industrial Co., Ltd. | Speech synthesis employing prosody templates |
JP2000174794A (ja) | 1998-12-09 | 2000-06-23 | Canon Inc | 通信制御装置及び方法 |
US6574194B1 (en) | 1998-12-18 | 2003-06-03 | Cypress Semiconductor Corporation | Architecture of data communications switching system and associated method |
US6499107B1 (en) | 1998-12-29 | 2002-12-24 | Cisco Technology, Inc. | Method and system for adaptive network security using intelligent packet analysis |
US6839850B1 (en) | 1999-03-04 | 2005-01-04 | Prc, Inc. | Method and system for detecting intrusion into and misuse of a data processing system |
US6405318B1 (en) * | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system |
US6804778B1 (en) | 1999-04-15 | 2004-10-12 | Gilian Technologies, Ltd. | Data quality assurance |
US6351811B1 (en) | 1999-04-22 | 2002-02-26 | Adapt Network Security, L.L.C. | Systems and methods for preventing transmission of compromised data in a computer network |
US6470027B1 (en) | 1999-04-30 | 2002-10-22 | At&T Corp. | System and method for providing message redirection in networked environments |
US6681331B1 (en) | 1999-05-11 | 2004-01-20 | Cylant, Inc. | Dynamic software system intrusion detection |
US6981155B1 (en) * | 1999-07-14 | 2005-12-27 | Symantec Corporation | System and method for computer security |
US7117532B1 (en) * | 1999-07-14 | 2006-10-03 | Symantec Corporation | System and method for generating fictitious content for a computer |
US6886102B1 (en) | 1999-07-14 | 2005-04-26 | Symantec Corporation | System and method for protecting a computer network against denial of service attacks |
US7461402B1 (en) | 1999-07-14 | 2008-12-02 | Symantec Corporation | System and method for preventing detection of a selected process running on a computer |
US7152239B1 (en) * | 1999-07-14 | 2006-12-19 | Symantec Corporation | System and method for preventing detection of a computer connection to an external device |
US6647400B1 (en) | 1999-08-30 | 2003-11-11 | Symantec Corporation | System and method for analyzing filesystems to detect intrusions |
US6971028B1 (en) | 1999-08-30 | 2005-11-29 | Symantec Corporation | System and method for tracking the source of a computer attack |
US7065657B1 (en) | 1999-08-30 | 2006-06-20 | Symantec Corporation | Extensible intrusion detection system |
US7203962B1 (en) | 1999-08-30 | 2007-04-10 | Symantec Corporation | System and method for using timestamps to detect attacks |
US7085936B1 (en) | 1999-08-30 | 2006-08-01 | Symantec Corporation | System and method for using login correlations to detect intrusions |
US6996843B1 (en) | 1999-08-30 | 2006-02-07 | Symantec Corporation | System and method for detecting computer intrusions |
US6826697B1 (en) | 1999-08-30 | 2004-11-30 | Symantec Corporation | System and method for detecting buffer overflow attacks |
US6757717B1 (en) | 1999-09-16 | 2004-06-29 | Proxyconn, Inc. | System and method for data access |
US6687833B1 (en) | 1999-09-24 | 2004-02-03 | Networks Associates, Inc. | System and method for providing a network host decoy using a pseudo network protocol stack implementation |
US6470384B1 (en) | 1999-10-28 | 2002-10-22 | Networks Associates, Inc. | Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment |
US6567808B1 (en) | 2000-03-31 | 2003-05-20 | Networks Associates, Inc. | System and process for brokering a plurality of security applications using a modular framework in a distributed computing environment |
US6519703B1 (en) | 2000-04-14 | 2003-02-11 | James B. Joyce | Methods and apparatus for heuristic firewall |
US7007301B2 (en) | 2000-06-12 | 2006-02-28 | Hewlett-Packard Development Company, L.P. | Computer architecture for an intrusion detection system |
US6907533B2 (en) * | 2000-07-14 | 2005-06-14 | Symantec Corporation | System and method for computer security using multiple cages |
US7032114B1 (en) | 2000-08-30 | 2006-04-18 | Symantec Corporation | System and method for using signatures to detect computer intrusions |
US20020066034A1 (en) | 2000-10-24 | 2002-05-30 | Schlossberg Barry J. | Distributed network security deception system |
US20020087883A1 (en) * | 2000-11-06 | 2002-07-04 | Curt Wohlgemuth | Anti-piracy system for remotely served computer applications |
US7290283B2 (en) | 2001-01-31 | 2007-10-30 | Lancope, Inc. | Network port profiling |
US6966837B1 (en) * | 2001-05-10 | 2005-11-22 | Best Robert M | Linked portable and video game systems |
US6694045B2 (en) * | 2002-01-23 | 2004-02-17 | Amerasia International Technology, Inc. | Generation and verification of a digitized signature |
US7359962B2 (en) | 2002-04-30 | 2008-04-15 | 3Com Corporation | Network security system integration |
-
2000
- 2000-07-14 US US09/615,891 patent/US7461402B1/en not_active Expired - Fee Related
- 2000-07-14 EP EP00945405.9A patent/EP1203280B1/fr not_active Expired - Lifetime
- 2000-07-14 AU AU61076/00A patent/AU6107600A/en not_active Abandoned
- 2000-07-14 EP EP00947429A patent/EP1210665A4/fr not_active Withdrawn
- 2000-07-14 WO PCT/US2000/019222 patent/WO2001006373A1/fr active Application Filing
- 2000-07-14 WO PCT/US2000/019224 patent/WO2001006386A1/fr active Application Filing
- 2000-07-14 AU AU59354/00A patent/AU5935400A/en not_active Abandoned
- 2000-07-14 WO PCT/US2000/019278 patent/WO2001005168A1/fr active Application Filing
- 2000-07-14 WO PCT/US2000/019487 patent/WO2001004753A1/fr active Application Filing
- 2000-07-14 AU AU62149/00A patent/AU6214900A/en not_active Abandoned
- 2000-07-14 AU AU61039/00A patent/AU6103900A/en not_active Abandoned
- 2000-07-14 WO PCT/US2000/019489 patent/WO2001004759A1/fr active Application Filing
- 2000-07-14 WO PCT/US2000/019488 patent/WO2001004758A1/fr active Application Filing
- 2000-07-14 AU AU62187/00A patent/AU6218700A/en not_active Abandoned
- 2000-07-14 AU AU62188/00A patent/AU6218800A/en not_active Abandoned
- 2000-07-14 AU AU60988/00A patent/AU6098800A/en not_active Abandoned
- 2000-07-14 WO PCT/US2000/019389 patent/WO2001004757A1/fr active Application Filing
- 2000-07-14 EP EP00948727.3A patent/EP1212682B8/fr not_active Expired - Lifetime
- 2000-07-14 WO PCT/US2000/019359 patent/WO2001004733A1/fr active Application Filing
- 2000-07-14 AU AU60987/00A patent/AU6098700A/en not_active Abandoned
-
2008
- 2008-10-27 US US12/290,215 patent/US7827605B2/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4922408A (en) * | 1985-09-27 | 1990-05-01 | Schlumberger Technology Corporation | Apparatus for multi-processor communications |
US5020052A (en) * | 1986-12-19 | 1991-05-28 | Alcatel N.V. | Packet switching network |
US5537099A (en) * | 1992-04-16 | 1996-07-16 | Bay Networks, Inc. | Receiving port security in a network concentrator |
US5581541A (en) * | 1992-06-17 | 1996-12-03 | Texas Instruments Incorporated | Hierarchical connection method apparatus and protocol |
US5642083A (en) * | 1994-11-28 | 1997-06-24 | Murata Manufacturing Co., Ltd. | High-frequency switch |
US5892924A (en) * | 1996-01-31 | 1999-04-06 | Ipsilon Networks, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
US5920705A (en) * | 1996-01-31 | 1999-07-06 | Nokia Ip, Inc. | Method and apparatus for dynamically shifting between routing and switching packets in a transmission network |
Non-Patent Citations (3)
Title |
---|
"Address assignment for nodes", IBM TECH. DIS. BULL.,, vol. 36, no. 7, July 1993 (1993-07-01), pages 301 - 302, XP002931306 * |
"Dynamic control of static connections through a serial switch", IBM TECH. DIS. BULL.,, vol. 34, no. 9, February 1992 (1992-02-01), pages 484 - 486, XP002931305 * |
"Technique for computer network security without encryption", IBM TECH. DIS. BULL.,, vol. 30, no. 4, September 1987 (1987-09-01), pages 1587 - 1589, XP000955196 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7337470B2 (en) | 2002-08-23 | 2008-02-26 | International Business Machines Corporation | Method for minimizing denial of service attacks on network servers |
US7685299B2 (en) | 2002-08-23 | 2010-03-23 | International Business Machines Corporation | Method for minimizing denial of service attacks on network servers |
Also Published As
Publication number | Publication date |
---|---|
WO2001004758A1 (fr) | 2001-01-18 |
AU5935400A (en) | 2001-01-30 |
WO2001004733A1 (fr) | 2001-01-18 |
EP1212682B1 (fr) | 2016-08-31 |
EP1212682A1 (fr) | 2002-06-12 |
WO2001004753A1 (fr) | 2001-01-18 |
EP1203280A1 (fr) | 2002-05-08 |
US20090064331A1 (en) | 2009-03-05 |
EP1210665A4 (fr) | 2008-12-03 |
AU6103900A (en) | 2001-01-30 |
EP1212682A4 (fr) | 2005-03-30 |
EP1203280B1 (fr) | 2017-08-30 |
WO2001004757A1 (fr) | 2001-01-18 |
EP1212682B8 (fr) | 2016-12-28 |
AU6214900A (en) | 2001-01-30 |
WO2001004759A9 (fr) | 2002-07-25 |
AU6107600A (en) | 2001-01-30 |
WO2001004759A1 (fr) | 2001-01-18 |
US7461402B1 (en) | 2008-12-02 |
EP1203280A4 (fr) | 2009-04-08 |
AU6098700A (en) | 2001-02-05 |
US7827605B2 (en) | 2010-11-02 |
WO2001006373A1 (fr) | 2001-01-25 |
WO2001005168A9 (fr) | 2002-07-18 |
AU6098800A (en) | 2001-02-05 |
AU6218700A (en) | 2001-01-30 |
EP1210665A1 (fr) | 2002-06-05 |
WO2001005168A1 (fr) | 2001-01-18 |
AU6218800A (en) | 2001-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6886102B1 (en) | System and method for protecting a computer network against denial of service attacks | |
EP1203280B1 (fr) | Systeme et procede de protection d'un reseau informatique contre les tentatives de violation provoquant un deni de service | |
US6971028B1 (en) | System and method for tracking the source of a computer attack | |
US20210288948A1 (en) | Secure domain name system | |
Chakrabarti et al. | Internet infrastructure security: A taxonomy | |
US7472414B2 (en) | Method of processing data traffic at a firewall | |
US8413248B2 (en) | Method for secure single-packet remote authorization | |
US20040193943A1 (en) | Multiparameter network fault detection system using probabilistic and aggregation analysis | |
Singh et al. | On the IEEE 802.11 i security: a denial‐of‐service perspective | |
Stathopoulos et al. | A framework for secure and verifiable logging in public communication networks | |
Fadlullah et al. | Combating against attacks on encrypted protocols | |
Trabelsi et al. | A novel Man-in-the-Middle intrusion detection scheme for switched LANs | |
Younes | Modeling and performance analysis of a new secure address resolution protocol | |
Stone-Gross et al. | VeriKey: A dynamic certificate verification system for public key exchanges | |
Lau et al. | Blockchain-Based Authentication for Network Infrastructure Security | |
Lin et al. | Evaluating Intrusion‐Tolerant Certification Authority Systems | |
Oliveira et al. | Understanding the Challenges in Securing Internet Routing | |
Kruegel et al. | Internet security | |
Cheung | Network Management & Security | |
Bishop | Security Analyses of Network Time Services | |
Henriksson et al. | Security vs. Plug-and-Play for Operation and Maintenance | |
Dias | Certificate polygamy: a matter of trust | |
GB2382281A (en) | Authentication or network users | |
Tupakula et al. | Analysis of automated model against ddos attacks | |
DAI et al. | Rebound wall: A novel technology against dos attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |